Discussion Thread Endwall 02/24/2018 (Sat) 01:52:08 [Preview] No. 1145 [Reply] [Last 50 Posts]
Want to say something off topic about anything?

Have a hot tip about something in the computer security world that doesn't fit into any current thread or category?

Want to chat with your fellow invisible 7 proxy friends?

Want to tell Lt. Gen Michael Hayden, GEN Keith Alexander, ADM Michael Rogers, GOOGLE, AMAZON, FACEBOOK and Microsoft etc. how you feel?

It's open mic at >>>/os/ , anything goes!!

Put all of your banter here:
12 posts omitted.

Endwall 08/13/2018 (Mon) 08:13:39 [Preview] No.1268 del
Nobody really gets in trouble for reading wrong think if done discretely. People get in trouble for posting or voicing wrong think in "public" and then getting their real life identities associated / attributed with the wrong think that they've posted or said vocally.

The consequences can range from public shunning and community ostracism, to loosing your job, to being blacklisted from your career and industry, to being publicly harassed, to being violently attacked, to being murdered or assassinated. And I'm not talking about communist China here, I'm talking about America.

And then there are people who get in trouble for reading the wrong information (Knowing too much), reading classified documents, learning the truth about events (9/11, moon landing, insert conspiracy theory) etc.

I'm not really concerned with that case. Most regular people just want to be able to engage in open debate (anonymous or not) on the internet about the taboo subjects (Politics, Religion, Sex, whatever) without loosing their fucking job or being black balled from their careers. For me I just want to read the news, watch some Youtube videos and occasionally post and debate in forums anonymously without backlash or negative repercussions. We don't live in a free society or in a free country, we've been lied to.

Endwall 08/13/2018 (Mon) 10:01:55 [Preview] No.1269 del

Also add criminal indictment and incarceration (Jail time) as a possible negative outcome of posting wrong think.

Endwall 08/17/2018 (Fri) 02:32:05 [Preview] No.1272 del
I'm using Hyperbola now on OpenRC. The packages are old and a lot of stuff doesn't work like mpv. So i'm done with endstream development until it works again, I'll either build it from source or wait for the package updates.

When I tried to install parabola base-openrc and it kept trying to pull in systemd as a dependency no matter what I did. Weird. I wiped the partitions and then used the parabola openrc disk to migrate to Hyperbola. Hyperbola seems OK, but the packages aren't as fresh, and some things don't work properly. I can't use links2 right now either because of some missing libraries or something. Whatever.

I tried installing Gentoo briefly when parabola failed. I got it to book off of LUKS on LVM, but then the kernel I compiled with make menuconfig, and then with genkernel, but the init sequence kept halting half way down the OpenRC boot sequence. I resynced and then recompiled, # emerge --ask @world and waited for 3 hours for it to finish then tried again, same stuff, non bootable kernel. I gave up after 16 hours of compiling, wiped everything and now I'm on Hyperbola. Gentoo Fail. I hate computers.

[email protected] 08/17/2018 (Fri) 03:17:42 [Preview] No.1273 del
I use Artix Linux these days. Yeah it's not full on 100% free software, but I had to use that on my new desktop while my librebooted X200 rots away due to its incredibly terrible battery life and general overheating issues that I always have with any old laptop. I probably have to wait another decade before I get an actually competent laptop, while I've heard some shit against the Purism team in sending out the wrong older gen laptop models than what was paid which I'm really fine with a 99% free corebooted laptop with modern specs but currently totally unaffordable.

Endwall 08/20/2018 (Mon) 23:34:05 [Preview] No.1276 del
I just tried Artix. xorg would start and then freeze with no keyboard or mouse input. Also I had to manually modprobe my network driver to get internet to start. Seems like it will be good in the future, but didn't work for me out of the box. Thanks for the tip.

I wiped that partition then attempted an Alpine linux install on encrypted lvm. I got it installed and booting, internet works, but my video card driver doesn't put a /dev/dri/card0 into the devices so Xorg won't start. apk is a fast package manager, packages are limited. No tor or torsocks, so I tried to manually compile these. torsocks compiled but there were missing libraries that prevented tor from compiling or getting past ./configure. Also several things had to be linked manually. I tried to use modprobe and it didn't work so I had to make a soft link to
uname -r
in the kernel modules directory, the package manager had a hiccup so I had to delete and remake a directory in /var/cache/apk, and other small annoying things. For instance not knowing how to add a user since useradd and usermod groupadd aren't there, so busybox has adduser and addgroup instead. Took me an hour just to figure that out.

I have /boot unencrypted and two lvm partitions that are encrypted with volumes for /root /usr /var /swap and /home.
My second encrypted partition boots to hyperbola which is familiar enough for me to keep using minus some missing applications and missing libraries causing unexpected behavior. mpv and endstream are working again. I noticed that endnode wasn't working out of the box on Alpine, I fixed it on that partition and I'll upload the changed file to github later.

I put Alpine on the first encrypted lvm partition after failing with Artix. I used these as a guide after setting up the luks encrypted lvm the usual way:




It took me a day of tinkering to get it to be usable in the command line (tmux, links, torsocks, geoiplookup ...) , but I couldn't get xorg to start due to a missing kernel driver or some kind of problem with the kernel not creating a /dev/dri/card0 for the display driver. My impression is that it's not ready for prime time yet. I'm going to keep looking. I might try Slackware next, that seems like a safe bet.

System Resources Endwall 07/05/2017 (Wed) 03:13:35 [Preview] No. 965 [Reply] [Last 50 Posts]
I have some observations to make.

## I just tested these systems:
MS DOS 6.22 runs in 384K of memory (1994)
MS Windows 3.11 runs in 2MB of memory with a full mouse driven GUI (1994)
Macintosh OS 7.53 runs in 7.4MB of memory , full GUI + TCP/IP (1996)
Macintosh OS 8.1 runs in 13.2MB of memory, (1997)
Macintosh OS 8.6 runs in 26MB of meomory, (1998)

OpenBSD 6.1 starts in text mode command line in 27MB of memory
OpenBSD 6.1 in Xenocara uses 65-80MB of memory to start up.

## from recollection:
Windows 7 800MB of memory (2009)

Parabola GNU/Linux starts in text mode cli using 150MB of memory
Parabola GNU/Linux in weston uses 300MB of memory

Message too long. Click here to view full text.

Edited last time by Endwall on 07/05/2017 (Wed) 03:17:31.
10 posts and 3 images omitted.

Endwall 09/19/2017 (Tue) 07:06:02 [Preview] No. 1032 del
The machine I used is a SunBlade 150 UltraSparc IIi 550MHz computer from 2003.

Anonymous 09/27/2017 (Wed) 21:38:23 [Preview] No.1038 del
I don't want to sound cliché but I suspect great part of the RAM in parabola is thanks to systemd.

Don't give up on GNU/Linux, there are some distros that take it to extremes to cut the packages to minimum. Source Mage in particular has the philosophy of only including what you want, nothing more, and the sources are clean and untouched. I don't have access to my installation but as soon as I get it I will post results, meanwhile look at how some guy went to have a graphical environment with 97MB.

Endwall 07/12/2018 (Thu) 08:34:29 [Preview] No.1247 del
Fresh install of Parabola/GNU/Linux-Libre/OpenRC

On an Intel core2 laptop

boot into cli from OpenRC

$ free -h

used 60 MB

start xorg as root

# startx

# free -h

used 75 MB

Message too long. Click here to view full text.

Endwall 08/20/2018 (Mon) 23:04:48 [Preview] No.1274 del
Alpine Linux on OpenRC
Fresh install on encrypted lvm with the services it said to start in the wiki guide. In command line on busybox.
$ free -m

I couldn't get X org to start, but it would probably add another 20MB on top of that.

Endwall 08/20/2018 (Mon) 23:11:21 [Preview] No.1275 del
Hyperbola with linux-libre-lts on OpenRC is similar to parabola. Boots into user account in command line in at around 100MB xorg adds another 20MB ontop to around 120MB. Booting into a user shell seems to be more memory expensive than starting as root.

I want to boot to command line in no more than 20MB with a GUI that brings me up to no more than 40-50MB of memory usage. Any more than that and there is too much going on.

VPN/proxy/TOR general thread Anonymous 04/15/2016 (Fri) 22:12:39 [Preview] No. 2 [Reply] [Last 50 Posts]
Cool board idea.

What's the safest possible way to browse the internet anonymously and safely? There's a thread on /tech/ with the endwall developer talking about proxychains, and that seems pretty cool. Some of the links to proxy lists seem dead, and I have found some online but why should I trust these random 'free' proxies?

What about proxychains over VPN? I'm currently using Mullvad which is alright, and I'm curious about more security if need be. Does a VPN -> proxychain -> TOR connection work? Sounds horribly slow in theory, but I think we all know that privacy comes at a cost in our current world.

I suppose I could call this a 'VPN/proxy/TOR general thread.'
57 posts and 5 images omitted.

Endwall 08/13/2018 (Mon) 06:23:09 [Preview] No.1262 del
Tor Proxy on Local Area Network (LAN)

What ?
Setup multiple computers on a LAN to route through a tor proxy for specific applications (Links2, , etc)

Why ?
-To allow novice Linux users (mom,dad,etc), to use Tor on applications that allow socks proxy settings like links2, without needing to know how to start Tor in the command line or setting a tor daemon.
- (My reason) To allow another computer to handle Tor with a base install and to close all ports except for 9050 (or a randomly chosen port) outbound on a select computer that you use for Tor browsing and other Tor applications (endcurl, endget, endtube, oldtube, torsocks) etc.

-If you have an implant or a beacon with key logging it will usually broadcast out on port 53 or port 80, close everything (using endwall.sh and comment all ports out except local host for the ports you need and the random outbound port you will use for Tor) and set Tor outbound to a random port (not 9050 say 34591) and set your Tor proxy server to accept inbound for this random port. This will basically squash outbound beacons.

How ?
You will need two computers to test this. On the Tor proxy server,find out the LAN router assigned internal ip address using
$ ip link

( for example say its and add these lines to /usr/local/etc/tor/torrc

Message too long. Click here to view full text.

Edited last time by Endwall on 08/13/2018 (Mon) 21:43:35.

Endwall 08/13/2018 (Mon) 22:04:00 [Preview] No.1270 del
The idea here is to have a minimal install no GUI just a few packages on the Tor proxy server, and use it as a proxy into Tor. On your client computer you will have a full GUI, and probably have installed several packages, some, which unknown to you, will have malware. This malware can be as simple as keylogging with an output beacon going out through port 53 or port 80. It will take you months of scanning your logs to even clue in to what's happening, in the mean time all of your Tor postings are correlated back to you by running the messages against a giant database of clear text key strokes.

So you close all of the ports including port 53 and port 80 to general output, you may mac address bind port 53 to a dns server (same computer as the proxy server) using the same method described with endwall.sh, as well as setup squid to mac address bind port 3128 to the squid proxy for 80,443 and close regular port 443 and port 80 output by commenting out those sections in outbound. That way general output on port 53,80,443 etc is suppressed (dropped), so that the malware beacons can't talk out.

Endwall 08/13/2018 (Mon) 22:10:33 [Preview] No.1271 del
I have a computer with parabola openrc with only a single port open to send socks5 proxy to the Tor proxy server. That's as good as it gets for me for now. My main desktop is MAC address bound to DNS servers (2 computers) and MAC address bound to the Tor Proxy, and Squid Proxy. I leave some ports open so that I can watch TV with endtv and endstream, which don't work behind squid. So I leave port 80,443,1935 open to general output on my desktop so that I can watch TV still. But you can modify some of the streams to lowest quality (low bandwidth streams) and run them behind Tor, reasonably well if you want to close port 80 and 443 for good. Oh but yeah you have to run it with 3 hops for a good transfer rate, still better than a VPN i guess. So you need to compile and link two versions of Tor, tor_stable with 6 hops and mods, and tor_stock with just the stock configuration with 3 hops. I use tor_stock when I use mpv to get around georestrictions, but you can use it for everything if you lower the bit rate on the streams.

Doing similar port restricting and mac address binding proxy schemes using OpenBSD or Gentoo Linux would be the next step. The final step will be to use dumb 8-bit machines to proxy into the Tor Proxy once someone designs it and produces the software.

Online Security News Endwall 07/07/2016 (Thu) 06:09:23 [Preview] No. 149 [Reply] [Last 50 Posts]
See a news article or CVE bug report on an emerging computer security issue and want to share it? Post below.

I will also post links to Hak5 Threatwire videos.
Edited last time by Endwall on 07/07/2016 (Thu) 16:22:47.
501 posts and 3 images omitted.

Endwall 07/18/2018 (Wed) 03:19:34 [Preview] No.1252 del
Hak 5

Fortnite Hackers Get Hacked, Mapping Public Fitness Data on Polar - ThreatWire
https://youtube.com/watch?v=MuV2nzjiKkM [Embed]

Endwall 07/25/2018 (Wed) 02:34:42 [Preview] No.1254 del
Hak 5

Vulnerable Election Systems, and Venmo is Public by Default - ThreatWire
https://youtube.com/watch?v=yXXKo8hgmuc [Embed]

Election Systems are Vulnerable to Hacks, Venmo Is Public By Default, and Midterm Candidates are Attacked in phishing attempts. All that coming up now on ThreatWire.

Endwall 08/02/2018 (Thu) 23:38:02 [Preview] No.1255 del
23andMe Sells Your Data, Google Announces Titan - Threatwire 12:22
https://youtube.com/watch?v=oK0kj6lJpQM [Embed]

Innovative anti-aging. Or as in 70 years look 30 years. Frankwon 08/10/2018 (Fri) 11:46:22 [Preview] No.1258 del
What do you think about it?
This person is selling the secret of eternal youth:

It could be a scam...but you never know, eternal youth sounds enticing...
No Spam 6 Month Ban
Edited last time by Endwall on 08/13/2018 (Mon) 21:35:18.

Endwall 08/13/2018 (Mon) 06:44:33 [Preview] No.1263 del
Steal One Billion Euros? Get Arrested - ThreatWire 9:29
https://youtube.com/watch?v=OpFYA-Xfx9U [Embed]

Endware Endwall 05/03/2016 (Tue) 08:54:28 [Preview] No. 32 [Reply] [Last 50 Posts]
Endware is a suite of programs geared towards internet privacy, security, and anonymity.

Endwall: endwall.sh is an iptables based firewall script designed to be implemented on any linux distribution shipped with iptables. endwall.sh is based on default drop policies, coupled with a novel strategy of passing packets on local host ports only for those enabled by the enduser. It comes with a variety of well used ports enabled with several additional port passing configurations available by uncommenting the script. It provides essential security to a new user.

Endsets: endsets.sh is a script that adds blacklisting and whitelisting functionality to endwall.sh. It depends on the program ipset. It is persistent on reboot if you enable ipset as a service. This is the recommended blacklisting tool for endwall if you are running a server or planning on opening up ports and services to the public and will require daily blacklisting of new incomming IPs.

Endlists: endlists.sh is a traditional text file list based blacklisting and whitelisting script. It has slow performance, and can't be updated on the fly. Good for <1000 ip subnets, very tedious and slow to run for more than that. Blocks the IPs by adding them as individual rules to the iptables ruleset. Works but not recommended for heavy duty on a server. May be useful for workstation use to block ip ranges if you are not opening up ports and services to public clients.

Endtools: endtools are a collection of scripts including alogz.sh, mlogz.sh, spamlogz.sh and iplookup.py. These scripts will help to service an enduser of endwall in adminstering endsets/endlists.

iplookup.py is a geoiplookup script written in python and requires python and pygeoip. It has simmilar functionality to maxmind's geoiplookup program and uses the maxmind *.dat files.

spamlogz.sh is a script that searches through log files to find flagged log entries flagged in endwall.sh, endsets.sh and endlists.sh.

alogz.sh is a daily log reading script designed to read the output of an apache http server's log output.

mlogz.sh is a daily log reading script designed to read the output of a postfix smtp server's log output.

Message too long. Click here to view full text.

210 posts and 3 images omitted.

Endwall 07/18/2018 (Wed) 03:24:27 [Preview] No.1253 del

I've fixed the error with endwall.sh and endwall_wifi.sh. It was a typo in an if statement on the loop over interfaces. Should work properly now.

That bug was there for 8 months and no one posted anything about it...

Maybe nobody uses it or nobody cares...

Well it's fixed now in any event.

Anonymous 08/10/2018 (Fri) 01:48:16 [Preview] No.1257 del
Good board. Thanks for the invite.

Anonymous 08/11/2018 (Sat) 04:17:38 [Preview] No.1259 del
>"I use Debian with dash as the interpreter for sh and your scripts don't work, so you should shebang it as #!/bin/bash and it will work."
Jesus Christ, no, sorry I know I'm fucking late but I meant you should just shebang it to bash instead of /bin/sh if you were gonna have bashisms.

>Can you give me an example of one of the bash-isms from my scripts ?
I haven't looked for every little thing but most of the scripts use "==" instead of the "=" operator when checking for equality.

Anonymous 08/11/2018 (Sat) 04:20:17 [Preview] No.1260 del
>Jesus Christ, no, sorry I know I'm fucking late but I meant you should just shebang it to bash instead of /bin/sh if you were gonna have bashisms.
Eh, sorry, dismiss that, I misread /bin/bash as /bin/dash, so yes, that was exactly what I meant, except I wasn't using debian but I WAS using dash as /bin/sh.

Endwall 08/12/2018 (Sun) 02:24:03 [Preview] No.1261 del

$ man test

yup you're correct I'll work on fixing that later. I just assumed that string equality was tested like in C++ or other programming languages with == . while assignment used = . I am mistaken. I'll fix it.

I wanted the files to be portable and work on as many distributions as possible. So I she banged it with #!/bin/sh .

I'll modify all of the if statements and comparisons to just use equality, and do some testing to see if that works everywhere including with dash. Hopefully that solves the problem. This might get done by the end of the month ... I'm going to be semi busy in September with back to school, and really busy after October.

I have to nuke my main desktop and reinstall from scratch so I'll be out of commission for the next day or two and probably not back up to capacity until next weekend while I reinstall stuff.

If you see anything else that is upside down in the code, comment below and I'll take a look at it. Thanks for the feedback, it is very helpful.

EndChan/InfinityNow Terminal Client Morphosis 06/03/2018 (Sun) 21:18:45 [Preview] No. 12749 [Reply] [Last 50 Posts]
How hard would it be to create a terminal client for endchan/InfinityNow? I know that the OverChan android app can view this site; does that work by scraping or is there an API?

It would be much more comfy to browse here from the terminal than through the browser. You could have proper keyboard navigation between posts, and you wouldn't need a mouse at all. The biggest issue that comes to mind would be solving the captcha for making posts.
8 posts omitted.

Anonymous 07/08/2018 (Sun) 09:39:38 [Preview] No.12825 del
Ncurses-based console client for sosach, you might try to fork it and change API.

Anonymous 08/03/2018 (Fri) 17:28:24 [Preview] No.12856 del
(4.95 MB 1920x1080 untitled.webm)
Thanks for the idea, OP

Anonymous 08/06/2018 (Mon) 20:03:18 [Preview] No.12857 del

Is this for real?

Anonymous 08/07/2018 (Tue) 17:01:02 [Preview] No.12858 del
Yup. It's real.
So far I'm focused on making a read-only browser, but I hope that with w3mimgdisplay I'll be able to add posting mode and captchas inside the terminal.
But before any public release I plan to revise the UI, add proper text formatting & post image viewing and make the backend more flexible.

Anonymous 08/08/2018 (Wed) 19:29:00 [Preview] No.12859 del
I'm hard as diamonds rt

(52.69 KB 720x643 DjJsWEhVsAEu48e.jpg)
Google turns evil Anonymous 08/02/2018 (Thu) 04:05:01 [Preview] No. 12853 [Reply] [Last 50 Posts]
Turncoats now will agree to censor their results. But remember how much of a ruckus they put up against China 10 years ago?

Anonymous 08/02/2018 (Thu) 21:35:20 [Preview] No.12854 del

Anonymous 08/03/2018 (Fri) 03:08:38 [Preview] No.12855 del
>Google turns evil

Shit effort at making a thread, btw.

(999.11 KB 360x449 "Et tu, Palemoon?".gif)
Palemoon blacklists NoScript Anonymous 05/12/2018 (Sat) 03:01:36 [Preview] No. 12708 [Reply] [Last 50 Posts]
As the subject says. It's been entered into their custom "bitch at the user with a popup until they disable it" database. To be fair to the developer, he has solid reasons for his stance. I'll try to summarize as there is a lot of misinformation and emotion out there fogging the issue.

1) The Palemoon project does not have enough developer juice to debug other software and addons.
2) Various users: "[website] does not work with Palemoon. Fix your shit, Moonman!"
3) Moonman: "Known issue. Stop being morons and disable NoScript. Thank you, and have a nice day."
4) Various users: "We did. Same problem. Fix your shit."
5) Moonman: "Oh. That's an actual issue with Palemoon then. I'm on it!"
6) Much hacking and cracking and time and talent are expended to no effect. Surprise! NoScript does not follow the standard of letting go of the browser when disabled. It lingers on. It has to be completely uninstalled with an added cache clearing operation on top of that.
7) Moonman: "It's NoScript. Get rid of it. Have a nice day."
8) Various users: "No. FIX YOUR SHIT!"
9) Moonman: "Crush. Kill. DESTROY!"

If you roll with my simplification you can see his point.

I have two observations. First, quite a few sites have a technical support checklist that runs like this: "What browser are you using? Palemoon? Oh good! We have two fixes you may choose from. One, use another browser. Two, go away and do not come back."

My irony sense is tingling.

Message too long. Click here to view full text.

12 posts and 1 image omitted.

Anonymous 07/05/2018 (Thu) 08:08:54 [Preview] No.12823 del
2) 32 bit systems: Dunno. This is going to be a problem for me.

Not a problem for me. I use either text mode browsers. Dillo. or older versions which probably have a lot of security issues but I'm not worried about that seeing as the times I browse on those systems are old already. I don't feel like going through the mess and compiling my own version of firefox or whatever. But there is RetroZilla which is quite nice.

Anonymous 07/05/2018 (Thu) 16:23:46 [Preview] No.12824 del
OP again. I noticed the thread flying by on the overboard. May as well drop my final observations.

I use Lynx with some regularity for ssh sessions, etc. In the year of our Lord 2018, a fully useful command line webbrowser still surprises the hell out of the Mircosoft wonks I come across. Nevertheless, a 32 bit system is no barrier to a desktop GUI, M$ or otherwise.

The end result was Waterfox for my 64 bit systems, and Icecat for my wee 32 bit on-the-road portable. The privacy tweaking learning curve was minimal and everything is running smoothly and to my satisfaction. Palemoon is a distant memory at this point. While this was an excellent thread all in all, I don't have anything else to add to the discussion and won't waste any more time on Palemoon related activities.

Thanks everyone!

Anonymous 07/24/2018 (Tue) 03:53:46 [Preview] No.12847 del
Palemoon is cucked a long time ago, I only use it as a secondary browser.

btw ungoogled-chromium superior

Anonymous 07/31/2018 (Tue) 14:46:46 [Preview] No.12851 del

Been doing UGC for a test drive for some time now. The only irritations I've found so far:

1) No way to conveniently prevent automatic page refreshing.
2) Installing extensions is a bit of a hassle.
3) No non-M$ 32bit version

Only that last is really irksome. Why no 32bit version?

Anonymous 08/01/2018 (Wed) 13:33:07 [Preview] No.12852 del

It also enforces tear off tabs with no way to disable. Something else I hate.

(34.60 KB 1200x800 DhabSjYW4AE8qu5.jpg)
The div that looks different in every browser. Anonymous 07/11/2018 (Wed) 23:02:51 [Preview] No. 12826 [Reply] [Last 50 Posts]

html {
display: table;
height: 100%;
width: 100%;

body {
display: table-cell;
vertical-align: middle;

div {
margin: auto;
width: 100px;
height: 100px;
outline: inset 100px green;

Message too long. Click here to view full text.

4 posts and 1 image omitted.

Anonymous 07/12/2018 (Thu) 10:22:13 [Preview] No.12832 del
Same on palemoon.

Anonymous 07/12/2018 (Thu) 13:20:19 [Preview] No.12833 del
version brothers holla

Anonymous 07/15/2018 (Sun) 19:50:09 [Preview] No.12838 del
> create web standards
> no one follows them

Anonymous 07/20/2018 (Fri) 15:48:14 [Preview] No.12844 del
This is fucking cool. I'm going to set something like this up to generate my company logo on my site.

Anonymous 07/29/2018 (Sun) 14:00:08 [Preview] No.12850 del
wait could copyright the CSS as like the input and then own the rights to the various shit it spits out?

Anonymous 07/12/2018 (Thu) 02:24:05 [Preview] No.12828 del
idk how you fools struggle so hard, there is an industry defined path
>learn basic overall computer shit (A+)
>learn networking (network+)
>learn security (security+)

from there you can find your niche and specialize where'd you like. you don't even have to get the certs just have the knowledge (unless you want to get a job of course).

Anonymous 07/12/2018 (Thu) 22:01:32 [Preview] No.12834 del
(213.43 KB 620x414 bitches.png)
I don't give a FUCK if they are getting into these political correctness stuff since I'm there to learn IT and security. And their tutorials are pretty good.

Anonymous 07/29/2018 (Sun) 12:18:14 [Preview] No.12849 del
any of you retards actually do stuff???
Have a home lab, go war driving, etc?
Or do you just copy paste links you'll never read

Anonymous 08/18/2018 (Sat) 15:40:59 [Preview] No.12860 del
>http http http
at least write https if a TLS version exists you lazy nigger

Russia's 'VPNFilter' malware Anonymous 05/23/2018 (Wed) 15:38:53 [Preview] No. 12742 [Reply] [Last 50 Posts]
So, they claim Russia attacked about 500,000 routers in Ukraine, with a software that gave root to them. Don't know if it's really from Russia or just democrats trying to push the "election-was-manipulated" agenda, but, that's the future: not as many bombs, but teams that crack the systems to get intel:

Anonymous 05/24/2018 (Thu) 17:23:56 [Preview] No.12743 del
James Clapper isn't a democrat you moron

Anonymous 05/25/2018 (Fri) 05:00:37 [Preview] No.12744 del
There is no James Clapper mentioned in the article.

Anonymous 07/25/2018 (Wed) 10:07:12 [Preview] No.12848 del
You’ve got to give the article some air of credibility, especially considering that the Russian government is the main culprit of the Ukrainian civil war. Such an attack would be in their interests not to mention that the Russian government has performed similar attacks on vital eastern Ukrainian infrastructure

(220.29 KB 1920x1080 1498596199651.png)
Anonymous 06/28/2017 (Wed) 14:13:05 [Preview] No. 8768 [Reply] [Last 50 Posts]
/g/ is building an OS

It's a riced out, gentoo based desktop distro

Has a nice low ram footprint

irc.rizon.net #cloveros
109 posts and 55 images omitted.

Anonymous 05/16/2018 (Wed) 19:33:43 [Preview] No.12730 del

also you can easily do anything in gentoo thanks to ebuilds

Anonymous 05/16/2018 (Wed) 19:35:40 [Preview] No.12731 del
(3.81 MB 3264x2448 IMG_20180330_004725.jpg)

Anonymous 05/18/2018 (Fri) 01:29:31 [Preview] No.12734 del
Nice background.

Anonymous 07/18/2018 (Wed) 11:50:41 [Preview] No.12839 del
Pretty cool distro, however.
There are a few things that the maintainers neglect to tell in their repository.
Things like the overlays used in the binaries.
From what I've been able to piece together is that most bins and most of their package.use is built around the Libressl overlay and (maybe?) a few others.

There is also a huge problem right now with the way they setup nvidia drivers.
The driver that is downloaded and supplied is (again from my understanding) built for linux version 4.14.* whilest CloverOS currently runs 4.16.* which is a uge problem because installing these drivers will destroy your install.
additionally, the nvidia drivers supplied are 396.24-r1 which is the unstable versions that lack legacy support for some older(not that old) graphics cards.
The system doesn't store a local version of their Gentoo sources, so if you want to go full Gentoo you'll have to download the sources.
This made getting dkms nvidia drivers a bit annoying.

It would be great if the script was updated to serve a dkms version of nvidia drivers, various versions would help with legacy support.
That being said, i get the feeling the scripts weren't designed much with supporting a wide range of systems.
If you use some memeware thinkpad/toughbook this distro is perfect right out of the gate.
If you want to get some other kind of setup to work it'll require a bit of legwork, but that's not a bad thing.
It's amazing how simplified this makes a your regular Gentoo install.
Because it's Gentoo I've been able to get most of the above to work perfectly.

Anonymous 07/20/2018 (Fri) 15:54:14 [Preview] No.12845 del
Not to be too forward, but I want to lick your desktop. Do you find this is a common reaction?

Anonymous 07/14/2018 (Sat) 17:20:20 [Preview] No. 12836 [Reply] [Last 50 Posts]
Does anybody here use stack exchange? Just curious, there are a lot of tech-oriented sites as part of stack exchange and I was wondering if /tech/ recommends any of them.

Anonymous 07/15/2018 (Sun) 19:44:10 [Preview] No.12837 del
>Does anybody here use stack exchange? Just curious, there are a lot of tech-oriented sites as part of stack exchange and I was wondering if /tech/ recommends any of them.

Only via search engine results. I attempted to contribute early on but lost interest, though there's a huge push to make their entire suite of sites a "safe space" for idiots to ask stupid questions without fear of being called stupid. I understand that being called an idiot isn't fun, though the goal of not being called an idiot is what pushed me to get good in the first place.

Anonymous 07/20/2018 (Fri) 15:08:43 [Preview] No.12842 del
Yes I do.
Stack Exchange is the only site I know of in the category which allows anonymous contributions. Others (even Wikipedia) block Tor and/or require registration.

Anonymous 07/20/2018 (Fri) 15:34:02 [Preview] No.12843 del

This is correct. If you find useful information take it, but don't get yourself involved. Their management publicly announced not long ago that they are to be considered typical sjw trash now, just another outlet for loony propaganda.

(98.58 KB 752x1061 473734734.jpg)
Anonymous 06/24/2018 (Sun) 20:08:57 [Preview] No. 12806 [Reply] [Last 50 Posts]

P2P web browsing via websites served and shared on individual nodes:
users can create their own websites and host them from their own computers/servers
users can upload and share other's websites on their own computers/servers
self serviced websites are manually named *but will generate a random entropy hash within the url, example:
node://7bv45ix0/8ch.net or node://c334o96y/endchan.xyz
*the random entropy hash prevents individuals from creating and overriding other established websites
endless domain creation: .com, .org, .info, .onion, .rebel, .on, .geek ... et al (infinite)
browser can access HTTP, HTTPS, FTP, Zeronet, Beaker, eMule/eDonkee and various obscure networks.
browser is enabled for users to share files with others, creating decentralized P2P file sharing
the browser would have its own built-in decentralized search engine similar to YaCy that can pull up any content found
high standard end-to-end encryption would be active by default for all P2P connections
browser has a lightweight bit-torrent client built-in
onion routing is not mandated but the option would be allowed within the browser
I2P routing would also be an option for users
Dust and IPFS could be utilized in the browser for further anonymity and resilient decentralization.

Message too long. Click here to view full text.

1 post omitted.

Anonymous 06/25/2018 (Mon) 17:02:42 [Preview] No.12808 del
Maybe for specific solution.
A torrent search engine being decentralized would be a great thing, and far harder to kill.
But to generalize it everywhere, I seriously don't think that's a good idea, because will you accept to pay electricity and general infrastructure to host the website of someone else? Moreover, since it's less effective than a data center, you'll have need more power to support the websites.

I think that for specific purposes, yeah. But I seriously don't buy in this decentralize dream. Maybe someone will make it work at some level, I don't know.

Anonymous 06/26/2018 (Tue) 15:39:17 [Preview] No.12809 del
Good point, I think there are some programmers out there aiming to do similar things but the problem is they are under-funded and rather scarce among the tech community (most of the tech community is now elitist drones within Silicon Valley that work for the big corps).

>I seriously don't think that's a good idea, because will you accept to pay electricity and general infrastructure to host the website of someone else?

It depends on how big those website are and how much content they provide. Something like endchan could likely be hosted by one individual with some server space I'd imagine (this one site likely takes up 20TB at max?) That said we could at least create our own image boards or blogs. This would help decentralize a lot of info and content. And the more users that join in and participate, the more potential this has as a whole for hosting all kinds of content.

Something like Soulseek alone has over a million users with billions of albums, movies, books, software etc. available to download. This only relies on users hosting content on from their own computers. Imagine if we got 10 million+ users on a completely decentralized browser which users can host P2P websites. It would revolutionize a whole kind of new internet that would become very hard to censor or control.

Anonymous 06/27/2018 (Wed) 16:18:55 [Preview] No.12810 del
More like 20 GB.


Anonymous 07/12/2018 (Thu) 22:23:33 [Preview] No.12835 del
You want an internet suite stuffed into one browser?
That's sorta something what Seamonkey and ChromeOS do and dozens of failed projects before them did.
Which is not really good. Having interoperability and data exchange between different gui applications is cool, but having your browser to do all the work is asking for a trouble with too much attack surface. I am also pretty sure, you can have all this shit like accessing zeronet, irc, tor and i2p, download torrents and email with set of web browser addons.
You should also understand that hosting stuff from home computer puts drawbacks on availability compared to a remote VPS in a professional datacenter, or a dedicated server in your basement with nig-rigged car battery UPS which not everyone is eager to invest in.
>the random entropy hash prevents
You just came up with some useless bullshit. Look at how onion, eepsite, gnunet and cjdns domains are resolved and generated. It should not only be a "random hash", but also act as a public encryption key or public key hash without reliability on someone's DNS servers.
The main problem of "le decentralized internet" is how easy it would be for external powerful actor to remove pieces of it, and remove them not only for one group of users, but for everyone. Let's say you live in small corrupt country and post on facebook. Your country's government wants to remove your posts from facebook, but until those break facebook's tos or facebook has big-money business in your country, they don't care. And what would your country do then, ddos facebook or block it? The latter is feasible, but blocks can be avoided, the data still exists on Facebook's servers and is available for those who put much effort in it.
Now say again, you live in Ancapistan Enterprizes Real Estate. A society of decentralized Internetz and such. You host your blog from home, a small single board server and a 1 gbit unlimited connection, pretty nice isn't it? One day you post something bad about McFacebook corporation on your blog. Automated web crawlers of YaCy search engine detect wrongthink and it triggers McFacebook CEO personally. What happens next? They simply DDOS your weak 1gigabit-wide channel to the point when your ISP, or datacenter where your VPS is hosted disconnects your server for consuming too much traffic and blackholes all requests coming for your address, your server is already inaccessible at this moment. It's done, McFacebook corporation completed it's mission and eliminated you quickly. What would you do next? You either go to your ISP or some decentralized CDN provider and ask them to implement a DDOS protection, i.e. you have to find someone who will host your shit for free on pure enthusiasm (ipfs and webtorrent) or for thousands of shekels (Cloudflare) or in exchange for datamining (Facebook). Now you get the same modern Internet and web, where you have to host your important information on a big datacenter with wide bandwidth, distribute content over wide network of CDNs and gateway proxies.

Anonymous 07/18/2018 (Wed) 15:43:21 [Preview] No.12841 del
Yeah, some girls wrote it years ago
Then google hired them and gave them soul crushing jobs so they would forget about ever having written the wooden stake that could kill the google vampire

(138.63 KB 414x433 1480819757263.png)
Anonymous 07/18/2018 (Wed) 15:14:19 [Preview] No. 12840 [Reply] [Last 50 Posts]

<!DOCTYPE html>
<html lang="en">
<meta charset="UTF-8">

OPSEC Endwall 08/23/2016 (Tue) 01:08:39 [Preview] No. 357 [Reply] [Last 50 Posts]
Discuss best practices for operational security.
12 posts omitted.

Endwall 03/26/2018 (Mon) 00:15:49 [Preview] No.1168 del
For better effect also disconnect any phones from your work study where you have your computers. And when doing sensitive things also disconnect your speakers from your desktop (Power off button or remove the input cord to your soundcard and power cord from the wall). Don't use WIFI anywhere, unless you're in a bind. Keep all your tcp/ip connections wired and firewalled. Don't use wireless 2.4GHz phones either. Don't give the party van more remote info to collect or ways to penetrate your residence remotely.

Personal and sensitive communications should be made face to face, or signaled using gpg or through other encrypted communications methods. Make sure the person you're talking to isn't a retard carrying a cellphone in their jacket pocket, and make sure to ask them about this before you start your conversations, and if they have a cellphone tell them to turn it off and remove the battery before you start your conversation.

Anonymous 07/12/2018 (Thu) 19:23:11 [Preview] No.1248 del
copied from:


(1) Don't use social media [Avoid Facebook/Myspace/Twitter/Snapchat/etc.] (no brainer) Tell your friends to just hang out with you face-to-face instead of using social media.
(2) Forward secrecy (keep your mouth shut about any personal info if you don't want to expose yourself)
(3) Use a cheap private VPN (w/ no IP logging policy) and Tor browser! You can also use an OS like Whonix or Tails to spoof your MAC address in extreme cases.
(4) Always disconnect your internet (physically) when you are not going to use it! Make sure bluetooth and WiFi is physically disabled/disconnected. Don't keep your modem online all the time! If you do, you are asking to be hacked!
(5) Use an old "flipper" phone. AKA a jitterbug. Cover up any camera if has one. Jitterbugs are basic cellphones for people with disability problems / senior citizens! Just a bare basic cell phone where you can take out the battery. Has no internet platform. Any kind of device that has a camera you might want to consider covering up because they can easily be hacked to spy on and identify you remotely.
(6) Flock to flea markets, garage sales, thrift shops to buy older electronics! Do not by 'smart' or 'green' appliances! Learn how to maintain and fix older products/utilities too! All IoT (Internet of Things) tech can be used to spy on you, avoid IoT and 'home automation' technologies! Trojan horses, all of them.
(7) Never put your real name or personal info into your computer, always use FAKE names / aliases.
(8) Use cash whenever possible. Credit Card and other digital transactions can be tracked and directly linked to you. Cash could be tracked back to you too, but it is much harder and takes a lot of effort and human resources for governments to do.
(9) No OS is safe. Just exclude as much personal information you can from your Operating System. Make sure its disconnected offline when not being used! Make sure bluetooth and WiFi is also physically disabled/disconnected when not in use. If you use a "hot spot" which I do NOT recommend, at least turn it off and put it inside a little faraday cage bag when not being used (to prevent more sophisticated remote tampering).

Anonymous 07/12/2018 (Thu) 19:27:21 [Preview] No.1249 del
(10) Always bleach you browser cache / cookies / web logs! 35x gutmann style! (Bleachbit, Ccleaner, etc.)
(11) Browser Security: Use Noscript Security Suite add-on. Noscript is a must: make sure to block all global scripts, wipe the whitelist in Noscript and re-configure the whitelist that best fits your browser habits. IPFlood is also a useful add-on to obfuscate IP GET requests. You should use Random Agent Spoofer (or Blender) to spoof your browser & OS metadata while you surf the web, making it a lot more difficult to track your activity. Tin Foil is another great security addon. Also, make sure WebGL and WebRTC are disabled in about:config (research how to disable those, there are tutorials out there).
(12) Its best to have two computers, rather than just one. For example, have one just for banking / legit LEGAL purposes. Have another one (completely separated) just for private or illegal activity. Make sure you don't put any personal info in the private computer.
(13) Use encryption and strong passwords! Write them down on a piece of paper or memorize them. DO NOT store passwords on a computer file. That is a big no-no! Try easy to remember long sentences for passwords, and combine all the words together. The more characters used, the harder it is for hackers to break the passwords.
(14) Have separate email accounts for each kind of activity (legal or not, don't matter).
(15) Make sure you physically disconnect your web cam or cover it up with black electrical tape. Most laptops these days come with web cams attached above or below the monitor. Make sure the camera cannot be used to identify you or spy on you in any way. (Yes, webcams can be hacked / remotely hijacked to spy on you!)
(16) Avoid new "Smart TVs" (they spy on you too)! If you have a newer TV, make sure you cover up or unplug the camera and microphone. Or keep it offline and disconnected from the cable box when not in use. You could cancel cable and just rip DVDs of your favorite movies and shows instead, using them on an offline TV set.
(17) Avoid all new digitized vehicles. They can easily be hacked, used to spy on you and even be remotely hijacked by criminal entities/governments!
(18) Never allow another person to use your computer. Make sure you routinely backup important files to a flashdrive or DVD and store that data offline. Also make sure you have a backup copy of the OS you use as well as backups of the software you use. If you ever have problems with your OS someday, just wipe your partitioned OS, and then re-partition the OS again yourself from scratch. Do not allow others to 'fix' your computer, they could easily steal information from your OS you might not want them knowing about. Geek Squad works with the FBI and other agencies to steal data from their customers, do not trust them to fix or repair your computer.
(19) Any photos you take with modern cameras contain EXIF metadata that contain GPS coordinates among other data used to identify the owner of the photo. If you store your modern photos online, people will be able to identify you. Don't do it! I repeat: do not post modern photos online unless you want to be identified! (I have been told PNG formats do not store any metadata, so photos converted to PNG might be safe).

Test your online privacy and learn more: https://www.privacytools.io/

Anonymous 07/13/2018 (Fri) 15:50:44 [Preview] No.1250 del
I might as well add this report to this OPSEC thread: https://archive.fo/bBjkm

Do not allow any electronic made after 2018 into your home and you better have some backup older electronics which don't have cameras and hidden mics. The Wall Street Journal just rubbed it in our face that this is going to become the norm very soon as they will be embedding tiny microphones in almost every single thing they can get away with. So anything digital beyond 2018: don't buy it.

And do avoid things like Echo, Siri and other crap created by the big tech monopolies. Make it clear to your family, relatives and friends you won't allow this around your presence (or at least in your own residence). It is all up to us to wake others up about how they are stealing our data and selling it all over the world and if we allow it we are stupid as a bunch of rocks.

Endwall 07/13/2018 (Fri) 23:55:01 [Preview] No.1251 del

I agree cook your own food. Buy from the local farmer's market, or from the grocery store. Cook your own food in your own house. Don't order in. As you mentioned its easy to poison you once they know your pattern. You call for take out and they intercept the delivery or have someone planted there to poison your pizza.

I just meant to say don't do crime or talk about crime or personal things on the phone, no phone sex, no dirty talk, just innocuous facts, and lawful business. "Hey are we low on milk? Yeah OK I'll pick some up, bye." Nothing about money, politics, drugs, crime, or sex. It's all being recorded digitally and stored, and if you become a "Person of Interest" they go through it and pin point all the incriminating stuff to use on you for blackmail, coercion, criminal indictment, front running etc.

Its too bad that they removed all of the public pay phones...If there were no cameras in the area you had a small level of anonymity (very small). We're going to have to look to an encrypted VOIP by tcp solution for a "Secure Line". Even then don't trust it too much.

Internet Security General Anonymous 04/16/2016 (Sat) 07:56:30 [Preview] No. 4 [Reply] [Last 50 Posts]
Continuing from >>>/tech/597
This is for non specific, general tips for anonymous web browsing and downloads, tips on browsers and browser configurations for the security concious that you don't want to make a new thread for.
88 posts and 7 images omitted.

ZyBxVLcAxIx Grace 06/09/2018 (Sat) 09:30:28 [Preview] No.1229 del
David Beckham has admitted that a big part of him has questioned whether he was right to retire from professional football but that he has been too busy over the past four months to dwell on the decision.

Hey that's great news. He's still in pretty good shape. He'll be signed in no time. Hope he gets a good contract!
No Spam 6 Month Ban
Edited last time by Endwall on 06/11/2018 (Mon) 07:00:31.

Anonymous 07/05/2018 (Thu) 23:59:13 [Preview] No.1241 del
Check out the bleeding edge tor source code!!


torsocks git clone http://dccbbv6cooddgcrq.onion/tor.git

Anonymous 07/06/2018 (Fri) 01:26:42 [Preview] No.1242 del
You can still do the 6 hop mod but in src/core/or/circuituse.c after you change default_path_len to 7 delete the line under it that says
else if fourhop_cutoff

also in src/core/or/or.h you can still change default_route_len to 6 but there is no option to modify max_recent_circuits from 1000 to 100

Endwall 07/06/2018 (Fri) 03:46:26 [Preview] No.1243 del
It compiled for me and linked in


I haven't fully tested it yet though.

But you're correct the options have all been removed from or.h . Also much of the code has been moved around and segregated into different sub directories.

Keep an eye on this. Also if you have any other good Tor mods please feel free to share.

Endwall 07/06/2018 (Fri) 04:03:41 [Preview] No.1244 del
circuitstats.h: * 1000 is approx 2.5 days worth of continual-use circuits. */
circuitstats.h:#define CBT_NCIRCUITS_TO_OBSERVE 1000
circuitstats.h:#define CBT_MAX_RECENT_CIRCUITS 1000
circuitstats.h:#define CBT_MAX_MAX_RECENT_TIMEOUT_COUNT 10000
circuitstats.h:#define CBT_MAX_MIN_CIRCUITS_TO_OBSERVE 10000
circuitstats.h:#define CBT_DEFAULT_TIMEOUT_INITIAL_VALUE (60*1000)

this seems to have been moved into src/cor/or/circuitstats.h

use grep to search for other missing / moved variables. Thanks for the tip >>1241 , >>1242 .

(816.64 KB 1308x1588 womens_health_formula_1.jpg)
por favor amigo the hacker known as 4chan 05/12/2016 (Thu) 09:45:50 [Preview] No. 31 [Reply] [Last 50 Posts]
I need someone to do an illegal for me, upload these fonts in a zip to any pomf clone and post link here pls kthx X3.


the hacker known as 4chan 06/10/2016 (Fri) 14:22:51 [Preview] No. 35 del
Sent ;)

the hacker known as 4chan 07/03/2018 (Tue) 22:08:31 [Preview] No.52 del
Arial *swoon*

(30.89 KB 800x800 Sticky.jpg)
Anonymous Board owner 05/09/2018 (Wed) 22:40:59 [Preview] No. 12705 [Reply] [Last 50 Posts]
Welcome to /tech/, a technology board. This board is for general discussion of technology.

Rule 1: Only threads about technology or /tech/ itself are allowed.
Rule 2: NSFW content are only allowed if they are spoilered.
Rule 3: No referral links, asking for cryptocurrencies, advertising or similar.
Rule 4: No spam or posts without meaningful content.

All rules and policies are open for discussion in this thread.

IRC: #/tech/, #InfinityNow and #endchan on irc.rizon.net - https://qchat.rizon.net/
Wiki (OLD): https://wiki.installgentoo.com/

Archived sticky threads:


Message too long. Click here to view full text.

Edited last time by _ on 06/19/2018 (Tue) 02:20:22.
16 posts omitted.

betamax Board owner 06/06/2018 (Wed) 20:25:08 [Preview] No.12769 del
For those that lack the context, here's some old threads:

Notice the gradual change of who's contributing and also notice how that Tor thing was criticized since day one. These days, that anon is only spamming his own list that he had somehow convinced the Endwall guy, AKA Board Owner of /os/ to host, and people here really don't feel compelled to contribute to that list anymore. More could be said as to who that anon is but that's unnecessary for the time being. As much as it was a /tech/ thing, now it's mostly just a website for a certain someone to promote his list as if it is /tech/ approved which it is not.

Anonymous 06/06/2018 (Wed) 22:17:09 [Preview] No.12771 del
>promote his list
Do you really think this matters that much to me? Take a guess, I don't.
You guys can do whatever you want. Endchan stopped being funny manny time ago, that's why I and anyone contributes anymore. I tried to do something. Didn't work. Time wasted.
Now go play moderator as you wish.

betamax Board owner 06/06/2018 (Wed) 23:02:34 [Preview] No.12772 del
Yet you keep on crawling back here time after time to waste your time in your persistently broken english. Nobody's really falling for your funny business. Go bitch and moan elsewhere but you know all too well that I can't stop you from destroying this place, you'll bypass it one way or another.

Anonymous Board owner 07/03/2018 (Tue) 18:01:19 [Preview] No.12821 del
It is done.

(206.06 KB 1500x788 1080.jpg)
Anonymous 06/21/2018 (Thu) 22:54:06 [Preview] No. 12804 [Reply] [Last 50 Posts]
Does there exist any alternatives to the CUDA technologies offered by Nvidia? Asking because of a few software applications which I desire to run but rely on those technologies to work most efficiently.

(203.71 KB 600x808 cage.jpg)
6 posts and 1 image omitted.

Anonymous 06/09/2018 (Sat) 22:16:27 [Preview] No.12781 del
reminder, if you don't like gitlab.com, there's always gitgud.io.
They've never lost any user data and run on faster hardware.

Anonymous 06/10/2018 (Sun) 04:34:49 [Preview] No.12782 del
GitLab as a web-based Git-repository manager with wiki and issue-tracking features is not GitLab the website that's on Microshit servers. GitGud.io runs on GitLab software, gitlab.gnome.org is not GitLab.com, etc., so basically, you're still a fucking moron.

Anonymous 06/10/2018 (Sun) 12:36:28 [Preview] No.12785 del
Damn, why so hostile?
I obviously referred to GitLab as a service (and GitHub as a service, not the GitHub desktop client used in offline mode) and that 250000 project whom just fled over according to https://twitter.com/gitlabstatus/status/1003887898142367744

Anonymous 06/13/2018 (Wed) 00:54:02 [Preview] No.12789 del
(112.00 KB 983x1445 allura.png)
(70.21 KB 783x503 link_to_artifact.png)
(101.08 KB 827x819 threaded_discussion.png)
A reminder that Apache Allura (which is used by SourceForge) still exists: https://allura.apache.org/
And it also includes a forum. What I always hated about GitHub and GitLab that some projects have hundreds of open "issues" because people use the Issue system as a forum for every type of discussions.

+bonus 1: usable without Javascript
+bonus 2: non-flat theme

Anonymous 06/18/2018 (Mon) 14:57:44 [Preview] No.12799 del
http : //JAPANFC2CAM.7th . it

This is a SFW board, NSFW content (which includes links) must be marked as NSFW content but otherwise this is considered spam. I'll let you go off with this ONE warning.
Edited last time by _ on 06/19/2018 (Tue) 02:07:56.

(131.90 KB 1876x781 Fer32.png)
Anonymous 06/15/2018 (Fri) 04:23:22 [Preview] No. 12790 [Reply] [Last 50 Posts]
It is very much a possibility that that which I seek no longer exists, but yet I shall post this here in an attempt to see if another has the .png file mentioned within this image. It was said to contain threads relating to the suppression of information released by whistleblowers along with information summarized in the rest of the post.

Any input is greatly appreciated.
3 posts omitted.

Anonymous 06/15/2018 (Fri) 07:22:28 [Preview] No.12794 del
is the info pertaining to anything particular? I read the whole thing but not sure if it's even hinting to anything in particular

Anonymous 06/15/2018 (Fri) 07:46:33 [Preview] No.12795 del
(40.26 MB 650x466 polak.png)
Sorry, I can't help you.

Anonymous 06/15/2018 (Fri) 08:04:11 [Preview] No.12796 del
(24.29 KB 366x366 fake assange.jpg)
No, it used to be a thread in >>>/POLAK/ but then some goddamn /intl/ gay nigger goon spammer(s) came along and took over that board and deleted all the content of the salt and blockchain files, of which after he was kicked out, much of them simply vanished, a couple fled to voat only to realize how much of a shithole it is, gave up, and a couple supposedly visited by spooks. The current Board Owner of /POLAK/ isn't the previous Board Owners of /POLAK/.

The whole point was to uncover the real untampered password behind Assange's encrypted files somehow through using the right blockchain data because of a supposed deadman switch that might had been dropped around the time rumors of black operations happened in the Ecuadorian embassy I think around October 2016 if I recall correctly. After that event, Wikileaks™ and Assange™ denied it happened yet Assange didn't show himself outside the window like he usually does while all of the original Wikileaks staff were pretty much gone if you knew even a tiny shred of their history. The John Pilger interview after that event was using some software capable of real time face capture and reenactment as well as audio signature, a clean shaven version of a man in his prior public appeearance had a beard. For a very long time there was a fake Julian Assange actor in his place and was the face of Julian's newer Twitter account. The interview after that one with Sean Hannity however, looked like the real deal guy which some speculate why the real Assange came back under what circumstances because something wasn't right.

None of that matters in the long run, Wikileaks have been and will continue to be co-opted by certain people of unknown power over this world and we will never ever fully realize what happened, a real spooky story which no matter how you look at it, nothing really changes in the end as the US government is still wholly corrupt and unable to jail the prime suspects of various criminal acts behind the 2016 election which is tied to various other undeniable public proof for conspiracy. Pick your own headcanon, none of it matters in the end. You could assume that white hat hackers somehow convinced their masters to leak certain information through Wikileaks™ and Assange™, or you could assume the very (((worse))). There was another deadman switch code released after but nobody gave a shit at that time since the consensus now is that some important people knows the key behind the encrypted code to decrypt should Wikileaks altogether gets shut down before their gathered documents get released. There's of course some ties with pizzagate and general Trump stuff but that's all political in its nature which is not /tech/ related. I still do think that the following image doesn't look like the real Assange but I can sure be totally wrong about that.

Anonymous 06/15/2018 (Fri) 08:06:21 [Preview] No.12797 del
Hmm, seems like /POLAK/ is gone. Well, it's for the best really.

Anonymous 06/15/2018 (Fri) 19:43:23 [Preview] No.12798 del
This sums it all up very nicely. The deadman key was huge happening, such a shame nothing was uncovered in the end.

Ghost in the shell Anonymous 03/07/2017 (Tue) 21:36:42 [Preview] No. 224 [Reply] [Last 50 Posts]
I won't pay for the new live action movie because I don't like white-washing movies when there are qualified asian actors for the roles. Frustrating. Can't hold a candle against the original anime:


Anonymous 03/07/2017 (Tue) 22:27:06 [Preview] No. 225 del
The saving grace might have been if she got her tits out. All they did was take an amazing film and ruin it for normies.

Anonymous 04/16/2017 (Sun) 06:58:43 [Preview] No. 269 del
All the jap actors are terrible and talk stupid. Scarlett did a good job

Anonymous 07/08/2017 (Sat) 16:50:59 [Preview] No. 277 del
>defending a fat kike
>defending needless white washing of a product

I wish Shingeki no Kyoujin was handled by Hollyjew.

Anonymous 08/21/2017 (Mon) 22:04:22 [Preview] No. 286 del
>le whitewashing
>original motoko has gray eyes and is 1,80 m tall
>major is a fucking robot and becomes little girl in the end of the anime
>character artist is fucking lesbian hentai mangaka and Oshii didn't ever imply Kusanagi had japanese appearance
butthurt murican chink detected
In the movie she is not Motoko in the beginning. She has a makeup that makes her eyes look slightly asiatic.
but movie is shit still, they didn't find actual japs to play confirmed japs like Togusa and Batou, the cgi is really awful, the didn't bother with creating a new city, they just slapped some olograms on HK skyline, and fat jewess is too old to play such role (there are some scenes without cgi where you can see her fat belly), but she is recognizable worldwide and I really doubt there are japanese actresses with enough skill and english knowledge (lipsync dubbing is not a common practice in hollywood).

[email protected] paython 06/14/2018 (Thu) 04:18:11 [Preview] No.291 del
god site

WireGuard ported to OpenBSD Anonymous 05/25/2018 (Fri) 07:26:39 [Preview] No. 12745 [Reply] [Last 50 Posts]
zx2c4 ported WireGuard to OpenBSD... that's great to have a formally verified VPN software in one of the most secure systems today:

Anonymous 05/25/2018 (Fri) 07:36:55 [Preview] No.12746 del
that's actually great news
t. great news pro

by the way, when will wireguard move from testing to stable in Gentoo?
I want muh post quantum algo kernelspace VPN too!

Anonymous 05/26/2018 (Sat) 09:41:29 [Preview] No.12747 del
(1.58 MB 320x240 1581.gif)
WireGuard is not
>formally verified VPN software

>Y-y-yes it is!
No, it's not. It is experimental software that is based on a formally verified protocol. Protip: TLS is also a formally verified protocol.

In addition:
>WireGuard is not yet complete. You should not rely on this code. It has not undergone proper degrees of security auditing and the protocol is still subject to change. We're working toward a stable 1.0 release, but that time has not yet come. There are experimental snapshots tagged with "0.0.YYYYMMDD", but these should not be considered real releases and they may contain security vulnerabilities (which would not be eligible for CVEs, since this is pre-release snapshot software).

>I want muh post quantum algo kernelspace VPN too!
WireGuard is not post-quantum secure by default, and in order to be configured to be, it depends on a pre-shared symmetric key that has to be exchanged out of band. At this point, that means hand-delivering the key.

Anonymous 05/26/2018 (Sat) 13:40:57 [Preview] No.12748 del
>>12745 (me)
You're right. Yet, I think it's still better than IPsec and a good improvement over OpenIKED delivered on OpenBSD. It is in development, but I think in the next year it should be more stable and secure. Good keep looking into this, for people doing their own VPN.

Anonymous 06/11/2018 (Mon) 20:33:43 [Preview] No.12787 del
>I think in the next year it should be more stable and secure
what other untold secrets of the cosmos does your crystal ball reveal, oh wise one! ?

5ghz waterchiller told! Anonymous 06/07/2018 (Thu) 07:21:40 [Preview] No. 12773 [Reply] [Last 50 Posts]
Intel CAKES their pants in 28 core 5ghz fiasco!

Crosspost from 8ch
>Intel hosts cringey as fuck presentation before AMD presentation
>Ends it with announcement of new 28 core CPU that will be stock 5 gHz
>Shows off a short cinderbench demo at 5 ghz
>Says will be available at end of 2018
>Doesn't specify price or what cooling it uses
>AMD announces Threadripper 2 right after with regular air cooled heatsink
>Next day Intel pulls demo units from show before press could dig into the specs
>Press manage to take photos of the mobo/cooler and some benchmarks
>Asus and Gigabyte used 1KW water chiller and custom loop to keep the chip at -10 at idle
>Commenters figure out it must be one of the Xeon Skylake X chips that Intel rushed for the show to have some desktop answer for TR2
>Anadtech mentions that they couldn't see one of the demo's at 5 ghz because there wasn't enough power to run the rig and the chiller at the same time
>Commenters conclude that the chip must be pulling over 600W at full 5 ghz


Anonymous 06/07/2018 (Thu) 07:23:41 [Preview] No.12774 del
(33.00 KB 515x424 water-chiller-1.jpg)
(22.05 KB 620x279 1.jpg)
Fuck sake, endchan didn't post the images.

Anyway, this is another serious blunder from Intel, after all the exploits that came out from their corner cutting for speed.

Some links:


>We confirmed that Intel was using a water chiller in the 5 GHz demo, a Hailea HC-1000B, which is a 1 HP water chiller good for 1500-4000 liters per hour and uses the R124 refrigerant to reduce the temperature of the water to 4 degrees Celsius. Technically this unit has a cooling power of 1770W, which correlates to the fact that a Corsair AX1600i power unit was being used for the system.


>Intel's demo didn't tell the full story. Many in the press mistakenly assumed the new processor runs at 5.0 GHz at stock settings, but we carefully analyzed video from the event and spotted a few obvious signs that the processor was overclocked. Intel was apparently running some sort of closed-loop cooling that required insulating material around the tubing. This turns out to be a water chiller hidden under the table. As expected, all of the components are properly shielded to avoid excess condensation from the chilled liquid.

>The one-horsepower Hailea HC-1000B is a beefy water chiller that can dissipate tremendous amounts of waste heat, but it also requires more than 1,000W for operation. We were originally going to witness the demo first hand, but there wasn't enough power handy to run both the chiller and the system simultaneously

Anonymous 06/08/2018 (Fri) 01:17:33 [Preview] No.12778 del
Why is intel not prepared?
They must have a huge R&D advance, from all of this years without any real advance an breakthrough, against an AMD which was nearly none existence.
This demo seems like they took a random card on their desk, plugged some cooling and tapped this together.

That's weird. Maybe intel is in a bad shape, even though that's hard to believe with the money they're making for so much long time. I would like to read more about this.

Anonymous 06/10/2018 (Sun) 07:19:36 [Preview] No.12783 del
Intel have been too busy losing their server market due to all the vulnerabilities in their chips because they cut corners to beat AMD in speed. I think Intel has been struggling to keep ahead of AMD for a long while now. This should be a spectacular shit show as they fall down hard in the coming years. I personally can't wait to see what new levels of low they can attain after this.

Anonymous 06/10/2018 (Sun) 12:22:06 [Preview] No.12784 del
Their R&D has been in Yidsrael for a while now. They probably can't keep up with AMD and have been using fraud and pipe dreams to buy a little more time for years.